IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port.
References
Information
Published : 2001-06-17 21:00
Updated : 2017-10-09 18:29
NVD link : CVE-2001-0402
Mitre link : CVE-2001-0402
JSON object : View
CWE
Products Affected
openbsd
- openbsd
freebsd
- freebsd
darren_reed
- ipfilter